Siemens SCALANCE and RUGGEDCOM
Several Industrial Communication Devices based on SINEC OS before V3.1 contain an incorrect authorization check vulnerability. An attacker with guest-level credentials could bypass role-based access control to perform actions that exceed the permissions of the guest role. Affected devices include RUGGEDCOM RST2428P and multiple SCALANCE switch series (XC, XCH, XCM, XR, XRH, XRM). The vulnerability does not require elevated privileges to trigger but could allow unauthorized configuration changes or disruption of network services. Siemens has released firmware version 3.1 for all affected products.
- Network access to the device management interface (Ethernet port)
- Valid guest-level user credentials or ability to authenticate as guest user
- Device running firmware version below 3.1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/16cc8e0d-804d-444d-a038-185666a51ff0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.